<--- Back to Details
First PageDocument Content
Cryptography / Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Finite fields / Group theory / Hyperelliptic curve cryptography / Tate pairing / DiffieHellman key exchange / BonehLynnShacham / Elliptic curve / Abelian variety
Date: 2014-08-03 16:15:38
Cryptography
Elliptic curve cryptography
Public-key cryptography
Pairing-based cryptography
Finite fields
Group theory
Hyperelliptic curve cryptography
Tate pairing
DiffieHellman key exchange
BonehLynnShacham
Elliptic curve
Abelian variety

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Download Document from Source Website

File Size: 810,58 KB

Share Document on Facebook

Similar Documents

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1  University of Cincinnati and Technische Universität Darmstadt

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

DocID: 1xVV9 - View Document

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1  3

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

DocID: 1xVNp - View Document

Multivariate Public Key Cryptography Jintai Ding 1  2

Multivariate Public Key Cryptography Jintai Ding 1 2

DocID: 1xVdX - View Document

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

DocID: 1xTwC - View Document

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

DocID: 1vi5X - View Document